Description |
1 online resource (xviii, 331 pages) : illustrations |
Series |
IFIP Advances in Information and Communication Technology, 1868-4238 ; 466 |
|
IFIP advances in information and communication technology ; 466. 1868-4238
|
Contents |
Intro; Contents; Contributing Authors; Preface; THEMES AND ISSUES; A MODEL FOR CHARACTERIZING CYBERPOWER; 1. Introduction; 2. Related Work; 3. Unified Cyberspace Model; 4. Defining Cyberpower; 4.1 Cyberpower; 4.2 State and Non-State Actors; 5. Characterizing Cyberpower; 5.1 Cyber Attack Attributes; 5.2 Cyber Attack Evaluation; 6. Conclusions; References; CYBER ATTACKS AND POLITICAL EVENTS: THE CASE OF THE OCCUPY CENTRAL CAMPAIGN; 1. Introduction; 2. Initial Violent Attacks; 3. Silent Attacks on Protest Supporters; 4. Violent Attacks on Protest Supporters; 5. Violent Attacks on the Government |
|
6. Attack Characteristics7. Motivation for the Cyber War Framework; 8. Cyber Warfare Framework; 9. Conclusions; References; ON THE SHARING OF CYBER SECURITY INFORMATION; 1. Introduction; 2. Definitions; 3. Previous Work; 4. Analytic Framework for Information Sharing; 4.1 Information Exchange Classes and Elements; 4.2 Framework Levels; 4.3 Incident Management Cycle; 4.4 Mapping the Elements to the Grid; 5. Standards and Standardization Efforts; 6. Conclusions; References; CONTROL SYSTEMS SECURITY; MODELING MESSAGE SEQUENCES FOR INTRUSION DETECTION IN INDUSTRIAL CONTROL SYSTEMS; 1. Introduction |
|
2. Background3. Sequence Attacks; 4. Sequences and Sequence Events; 5. Modeling Message Sequences; 6. Experiments and Analysis; 6.1 Modbus; 6.2 MMS; 6.3 IEC104; 6.4 Discussion; 7. Related Work; 8. Conclusions; References; INDUSTRIAL CONTROL SYSTEM FINGERPRINTING AND ANOMALY DETECTION; 1. Introduction; 2. Related Work; 3. Background; 4. Experimental Setup; 5. Fingerprinting Methodology; 6. Fingerprint-Based Anomaly Detection; 7. Conclusions; References; TRAFFIC-LOCALITY-BASED CREATION OF FLOW WHITELISTS FOR SCADA NETWORKS; 1. Introduction; 2. Background; 2.1 Network Flow and Flow Whitelists |
|
2.2 Traffic Summary2.3 Degree Centrality; 2.4 Locally Frequently-Used Ports; 3. Flow Whitelist Creation; 3.1 Overview; 3.2 Phase 1: Preparation; 3.3 Phase 2: Generation; 3.4 Phase 3: Inspection; 4. Experimental Results; 4.1 Phase 1: Preparation; 4.2 Phase 2: Generation; 4.3 Phase 3: Inspection; 4.4 Discussion; 5. Conclusions; References; A SYMBOLIC HONEYNET FRAMEWORK FOR SCADA SYSTEM THREAT INTELLIGENCE; 1. Introduction; 2. Related Work; 3. SCyPH Framework; 3.1 Overview; 3.2 Honeynet Layer; 3.3 Interaction Layer; 3.4 Infrastructure Modeling Layer; 3.5 Logging Layer; 4. GridPot; 4.1 IEC 61850 |
|
4.2 Experiment Design4.3 Infrastructure Modeling; 4.4 Logging and Anomaly Detection; 4.5 Experimental Results; 5. Conclusions; References; ENHANCING A VIRTUAL SCADA LABORATORY USING SIMULINK; 1. Introduction; 2. Related Work; 3. SCADA Laboratory Overview; 3.1 Process Simulation; 3.2 Programmable Logic Controller Simulation; 3.3 Human-Machine Interface; 4. SCADA Laboratory Enhancements; 5. Experimental Results; 5.1 Normal Operation; 5.2 Startup Operation; 5.3 Attack Operation; 6. Conclusions; References; HOW INDUSTRIAL CONTROL SYSTEM SECURITY TRAINING IS FALLING SHORT; 1. Introduction |
Summary |
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Cyber-Physical Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, Risk and Impact Assessment. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nineteen edited papers from the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2015. Critical Infrastructure Protection IX is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Mason Rice is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA |
Bibliography |
Includes bibliographical references |
Notes |
English |
Subject |
Computer networks -- Security measures -- Congresses
|
|
Computer science.
|
|
Computer security
|
|
Computers and civilization.
|
|
Computers.
|
|
Management information systems.
|
|
Electronic Data Processing
|
|
Computer Security
|
|
Computers
|
|
Management Information Systems
|
|
computers.
|
|
Computer networks -- Security measures
|
|
Computer science
|
|
Computer security
|
|
Computers
|
|
Computers and civilization
|
|
Management information systems
|
Genre/Form |
dictionaries.
|
|
proceedings (reports)
|
|
Dictionaries
|
|
Conference papers and proceedings
|
|
Dictionaries.
|
|
Conference papers and proceedings.
|
|
Dictionnaires.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Rice, Mason, editor
|
|
Shenoi, Sujeet, editor
|
ISBN |
9783319265674 |
|
3319265679 |
|